Friday, November 29, 2019

Trash Andy Mulligan Sample Essay Example For Students

Trash Andy Mulligan Sample Essay Topic sentence quality conventionExamples/evidence context quotation marksExplanation of illustrationsReasoning sentence Olivia Weston is the impermanent house female parent at Behala’s Mission School and she has been characterised as a compassionate person who wants to do a difference to the children’s lives. Olivia’s compassionate nature is revealed chiefly through her ideas and behavior. Part manner through the fresh Olivia recounts her trip to Colva Prison with the male childs. She begins this subdivision explicating how she â€Å"fell in love† with the Behala kids and the â€Å"eyes looking at me. and the smiles† ( p. 78 ) . She goes on to portion that sing â€Å"the mountains of rubbish. and the children†¦ is a thing to alter your life† ( p. 78 ) . Olivia’s ideas instantly place the reader to understand the deepness of her fondness for the Behala kids and her desire to care for them. We will write a custom essay on Trash Andy Mulligan Sample specifically for you for only $16.38 $13.9/page Order now Her compassionate nature is farther reinforced through her behavior when she helps the male childs visit the prison. In fact. non merely does she move as their bodyguard. she pays for their new apparels even though the â€Å"prices stunned † . and she pays for the cab menu even though she â€Å"gulped when saw the meter† ( p. 83 ) . Clearly. Olivia does whatever she can to assist the male childs. despite the fact that they achieve their ends at her disbursal. Word picture via ideas and behavior has positioned the reader to see Olivia as a compassionate person. whose admirable qualities frequently result in her being manipulated by those she most attentions for.Topic sentence value agree/disagreeExamples/evidence context quotation marksExplanation of illustrationsExamples/evidence passageExplanation of illustrationsConcluding/linking sentence One of the cardinal values promoted in Trash. which strongly aligns with my ain belief system. is ‘community’ and an grasp for the support that communities offer. Valuing one’s community is presented through Raphael and his traumatic experience at the constabulary station. When he returned to Behala the â€Å"whole vicinity came out† because when â€Å"one of their Numberss is hurt. everyone feels the wound† ( p. 79 ) . Raphael is thankful for the community’s attention and compassion. and it helps him retrieve from the incident and go on to work out the Jose Angelico enigma. As a instructor. I invariably experience the benefits of belonging to a strong school community. At the minute in WA. the province authorities is cutting funding from public instruction and instructors will be involved in industrial action. My school’s board has endorsed the teachers’ actions and requested that pupils and parents get behind us excessively. I am thankful for their support because we will non be successful if we do non hold a united voice. and this speaks to why I value the thought of community. On this juncture. my values align with the values promoted in Trash. but this is non the instance when it comes to swear.

Monday, November 25, 2019

The Pros and Cons of Article V of the United States Constitution Essays

The Pros and Cons of Article V of the United States Constitution Essays The Pros and Cons of Article V of the United States Constitution Paper The Pros and Cons of Article V of the United States Constitution Paper Essay Topic: Pros and Cons The United States Constitution is one of the most significant documents in modern world history. Its official date of adoption was on the seventeenth of September in 1897. The Constitution itself represents the advent of democracy, justice and freedom in a once-was colony which thereafter gained its independence. It established three branches of government; the legislative branch, the judicial branch and the executive branch. Additionally, the Constitution outlined the relationship between the country’s citizens and the Federal government. Many section of the Constitution have been debated and examined. One of the most interesting articles is Article V which details the process of ‘amending,’ or revising, the Constitution. There are two ways to go about the amending process. According to usconstitution. net, â€Å"the first method is for a bill to pass both houses of the legislature, by a two-thirds majority in each. Once the bill has passed both houses, it goes on to the states. This is the route taken by all current amendments. Because of some long outstanding amendments, such as the 27th, Congress will normally put a time limit (typically seven years) for the bill to be approved as an amendment. † Secondly, Congress on the Application of the Legislatures of two thirds of the several States, shall call a Convention for proposing Amendments, which shall be valid to all Intents and Purposes, as part of this Constitution, when ratified by the Legislatures of three fourths of the several States (Philip 26). This procedure has never been used to amend the Constitution. One pro of this Article is the fact that the executive branch, or the President, does not have an official role in the amendment process. He cannot veto a proposed amendment. This limitation to power, an example of the system of ‘check and balances’ so central to the philosophy of the Constitution, prevents the President from engaging in self-serving ratification. In an article entitled Is it time for a convention? Article V of the Constitution is a not-so-secret weapon for opponents of ObamaCare and other federal outrages, Philip Klein discusses a con of Article V. Namely, he examines the second method of amendment, or the Constitutional Convention. As the article details, many conservatives find the prospect of a Convention appalling and dangerous. Klein recalls that â€Å"at the time of the founding, the ability of the states to call a convention to propose amendments was seen as a way to prevent the federal government from becoming too expansive (Klein 28). Is the fact that this second method of amendment has yet to be used an indication that the Federal Government far overpowers decision-making on a State majority basis? The U. S. Constitution is an impressive document, one open to interpretation, clarification and ratification. This process is ongoing, one which changes as the times themselves change and evolve. In relation to the ever-important Article V, Klein asks if we dont use a mec hanism that the Founders designed for the purposes for which they designed it, then were not paying respect to their design (Klein 31). Perhaps we should consider ourselves doing a disservice to the founding fathers by not examining this aspect of Article V more carefully. Klein, Philip. Is it time for a convention? Article V of the Constitution is a not-so- secret weapon for opponents of ObamaCare and other federal outrages. The American Spectator Oct. 2010: 26+. Expanded Academic ASAP. Web. 14 Nov. 2011. U. S. Constitution Online. 2010. Steve Mount. 12 November 2011

Friday, November 22, 2019

What is a theory Essay Example | Topics and Well Written Essays - 1750 words

What is a theory - Essay Example In this scientific stage, experiments and accumulation of empirical data played a major role in arriving at general statements. It was a down-up approach of knowledge acquisitions where a wider base of empirical data was used to precisely make predictions and explain phenomena. On the other hand, theoretical stage is characterized by use of abstract statements that not only explain observed phenomenal in a unified manner, but also yield predictions far beyond the reach of inductive methods. Theories according to Hung are produced by mind just the way empirical data are a product of our common senses. The scientists who create such theories are called theoreticians and the field of science is full of them such as Newton, Dalton, and Franklin just to mention a few1. Contrastingly, the use of theories in search of knowledge is a top-down approach2. Scientists believe that an empirical generalization of a phenomenal no matter how many instances of confirmations is not enough to warrant scientific conclusions. The generalizations are not trustworthy unless they are supported by a theory. Otherwise the generalization statements may look like a mare fantasy of our senses and ad hoc conclusions. Theories occupy a central place in advancement and development of science without which scientific discovery may be seen as brute irrational facts. Hung argues that, theories make science rational and aesthetically pleasing3. Nature of Scientific Theories In science, it means an explanation or model that covers a substantial group of occurrences in nature and has been confirmed by a substantial number of experiments and observations. A theory may have one statements or a number of statements. Most scientific theories are enthymemes. This means they contain hidden premises called auxiliary hypotheses which help us understand the implications of a theory. For instance, the statement "Earth is round", if a ship should sail away over the horizon, the hull disappear before the masthead does, is invalid unless supported by an extra premises such as "light travel in a straight line". Normally this extra premise is omitted in many theories as scientists take them as too obvious to warrant any explanation4. A theory is more general and better verified than a hypothesis. Thus can be referred to as a theoretical hypothesis. Unlike empirical generalizations, theories are free inventions of mind. For instance Newton devised theory of gravity to explain why things fall down; Dalton invented a theory of atoms to explain why certain things can combine with others. In all the above theories, none had access to these new phenomena such as gravitation force or the micro particles of atoms world. However, through their imaginations they were able to come up with this wonderful discovery of the invisible world. Consequently, one may ask; why then should scientists accept this imaginative creativity of scientists and refute the imaginations of a lay person It should be noted that scientists imaginations is different from a lay person dreams of unreal world since scientific theories had passed the acid test of logical feature that affirm a good theory. Not all theories are good per se, therefore, there is need to investigate the logical features of a good theory. According to Hung, a good theory must explain

Wednesday, November 20, 2019

Evaluate to what extent we are witnessing a decollectivisation of Essay

Evaluate to what extent we are witnessing a decollectivisation of British Employee Relations - Essay Example the exercise of a person’s desires and goals and so he will tend to value self reliance and independence and at that time resist a lot of the interference from outside exerted upon the interests of a person whether by the family, society or other institution or group. Individualization focuses on the individual making him its focus and therefore begins with the basic premise that a human person is holds primary importance in the liberation struggle. It has at times been applied to mean the quality of being an individual. Individualism is therefore associated with bohemian and artistic interests and lifestyles in which there is experimentation and self creation as opposed to popular mass opinions, tradition and behaviors as with humanist ethics and philosophical positions (Brown & Marsden 2010, pp. 2) Human resource management (HRM) involves planning, managing recruitment, implementing, training, career and initiatives of development in an organization. Human Resource Management aims at maximizing an organization’s productivity through the optimization of employee effectiveness while at the same time improving the life of employees at work and treating the employees with dignity as resources that are valuable. Human Resource Management incorporates efforts aimed at the promotion of personal development, the satisfaction of employees and compliance with laws related to employees. As a result it brings gain to both the company and the employee. The employer benefits from better work performance while the employee gets satisfaction at the work place among other things.The Human Resource Management shift is important to the management of a business. When the shift happened in business dynamics companies realized that the knowledge that people have and the people themselves pro vide the single source for competitive advantage that is sustainable (Brown & Marsden 2010, pp. 3). The reason for this is that other resources that are related to technology, materials,

Monday, November 18, 2019

Governance and Ethics Essay Example | Topics and Well Written Essays - 5000 words

Governance and Ethics - Essay Example Business corporation managers are required to manage business activities on behalf of the owners, while governors are required to ensure that the business is managed properly. Therefore, governors are custodians of the stakeholders. As a result, companies need to disclose corporate governance issues in their annual reports and ensure that they comply with principles of corporate governance. In UK, the principles and provisions of corporate governance are provided in the UK Corporate Governance Code 2012 (Financial Reporting Council, 2014). Companies listed in FTSE need to comply with these principles and provisions, and disclose their corporate governance activities. As custodians of the shareholders’ interests, governors should behave ethically and call for managers to act ethically as well (Crane & Matten, 2010). This leads to the concept of ethical governance which involves doing the right thing in order to fulfill the interests of a wide range of stakeholders. One of the FTSE companies is Barclays Plc is a multinational corporation offering financial services in 50 countries, with core business operations in South Africa, UK, and USA. The company operates under the regulatory standards of local and global markets. It employs 132,300 people and 732 senior managers globally. The company’s profits after tax have been declining from  £4,499 in 2010 to  £845 in 2014 (Barclays Plc, 2014). This is attributed to the sovereign debt and economic crisis that affected European countries since 2011. The economy is now in recovery and is expected to improve. In its annual report, Barclays discloses information about its corporate governance, stakeholders and ethics. This report provides an analysis of the corporate governance and ethics of Barclays Bank using the company’s annual report of 2014 and other research information about the company that is relevant to the concept of corporate governance and ethics.

Saturday, November 16, 2019

Technology Used By Drug Dealers Information Technology Essay

Technology Used By Drug Dealers Information Technology Essay The Report discuss about the case of an arrested drug dealer who is suspected of the operations which are running with the help of laptop. In the first part of the report it gives the details about main technologies which the suspect makes use in order to communicate with his co-conspirators, it also points out the problems posed by the technologies in carrying out the forensic investigation. In the second part the report discuss about the possible sources of evidence which could be obtained from the laptops file system. 2. Computer Forensics: Computer forensics is a branch of forensic science permitting to legal evidence found in computers and digital storage media, it is also known as digital forensics. The goal of computer forensics is to explain the current state of a digital artefact; where as the term digital artefact can includes computer system, storage medium and an electronic document. The subject of computer forensics has evolved into major field in the legal systems around the world, in the year 2002 the FBI stated that fifty percent of the cases the FBI now opens involve a computer[1].similar to the pathological forensic which is called the forensic medicine where as the body temperature cuts and marks etc are looked for, clues and marks are looked within the system memory to get the detail description which effects to the relationship of the crime, these are looked by the digital forensic. We can make a challenge for the digital forensic which involves retrieving the data from the existing or from the deleted files. The challenge of the digital forensic examiner is to To determine what type of pasts have been produced the evidence before us. To understand what type of pasts could not have produced the evidence before us. Able to give a demonstration on the value of the assessment to the third parties which it should be understanding to them. 3. Technology used by drug dealers: According to the current analysis we have to find the answers for the questions that are critical which are the possible key technologies that the drug dealer could possible uses it, There are three questions: Qno1: what is the need for the illicit drug dealers to turn on the computer technologies to run their business? Qno2: What are the attractive technologies that a drug dealer uses to perform his communication with co-conspirators without being caught by the police? Qno3: How and what possible conclusions can be obtained from the analysis? 4. about the new technology: Ans1: answer to the first one is twofold. Ans2: the latest communication technologies used by the drug dealers are To reach the larger audience and to expand the base of the business To run the operations as secretly as possible And not to leave any evidence to the police. According to the current situation the dealings and the business runs by using the mobile phones, mobile phones are the most widely used by the drug dealers for the communication but this trend is changing because now a days the mobiles can be tapped on the network and even if the phone is misplaced or lost then the contacts of all the drug dealers can be revealed and by using the mobile phones they cant communicate in the crowded places. Hence the selection of the new ways of communication is imminent. The advent of modern network technologies like computer to computer communication technologies and social networking websites had made the communication strong and had opened the new ways to communicate through the various places for the each individual. The technologies adopted by the drug dealers for the communication is Spamming net drug dealer gets 30years in prison revealed by CNET news in the year 2007 2nd august Italian drug dealers as early adapters of innovative communications technology revealed by Experiential in the year 2008 23rd august. Google site used by drug gang revealed by BBC news in the year 2005 22nd July. 5. Key technologies used for communications by drug dealers: Listed below are some of the key communication technologies that a drug dealer is believed to be using to perform his operations. 1. Instant messenger programmes 2. Social networking websites 3. VOIP programs 4. Email encryption programs and spamming. 5. Content sharing websites. 6. Private online chat rooms. 7. Blogging and micro blogging websites. Instant messenger Programmes: Instant messenger programmes had been the main source because these are fast and easy and they are available in the market for a quite while now, popular programmes like Google talk, yahoo messenger, windows live messenger, meebo and many other are used by a large number of users. These instant messenger programmes can be linked with free instant messenger chat encryption software which is used to available easily in the internet. IM ENCRYPTO is one such software which can be used in conjunction with the yahoo messenger and establish the secure connections which can only be deciphered by the computer which is having the correct encryption key. Having installed the program need to be generated a key pair which is used for the encryption and decryption, this type of operation is performed on the second stage of IM Crypto configuration wizard, and one more important point about the software is that the others cannot see the chat messages and they only see the garbled set of characters, but this software must be installed by the two parties where the communication is done. Social networking websites: There are so many social networking websites like face book, orkut, Hi5, Friendster MySpace, net log etc, The social networking sites also serve the qualitative purpose of the drug market as majority of the consumers of illegal drugs happen to be teenagers who are also largest spenders of time on the social networking websites and hence they have a great probability of being contacted by a drug dealer. The drug dealer could also use these social networking sites to keep in contact, exchange information, advertise his products, recruit new drug peddlers, and get information on events and student gatherings all at the easy and privacy offered by these websites. Orkut is one such popular website which it is to be operated by the Google which it is on the news on the recent days for the wrong reasons. Criminals such as the drug peddlers establish members-only groups on popular social networking websites and then exchange messages and information with other members. And also the advent of 3G mobile communications ensured mobility and faster connectivity to the internet. Hence the drug dealers can communicate through social networking websites right from their mobile phones using unsecure wifi hot spots and hence get away un-detected. Similar to Instant messenger programmes, the social networkings websites can also used on the 3G phones and hence pose a danger of highly secure communication channel to the drug peddlers. VOIP programmes: VoIP programmes could very well be the most popular and useful communication between the drug dealers because softwares like Skype is so useful in the communication because it offers with the less cost and even it is the secured communication Skype has been the most used software in the VoIP programmes which are followed by windows messenger and yahoo messenger. These VoIP programmes is that which it helps the drug dealers to communicate by the voice and by the video with their customers through the internet, it is the most secure communication to the drug dealers and these conversations cannot be intercepted by the police. According to the Reports in BBC website, officers in milian say organised crime, arms and drug traffickers, and prostitution rings are turning to Skype in order to frustrate investigators. www.bbc.com stated that on 20/05/2010 that the Italy police warn of Skype threat Skype programme is secure because it uses the encryption system and it is easily available in the market where as the encryption system the company keeps the issue confidential and even it does not discloses to the law enforcement agencies. So according to the sources available in VoIP programmes the drug dealers uses this communication to perform their operations. Email encryption programmes and spamming: Data encryption is the source where it is done in a process because nobody can read the data or message expects the person whom the data is addressed. Drug dealers will very well make use of the different email encryptions like pipeline exchange, certified mail, read notify, which these encryptions work with the e-mail clients like Microsoft-outlook. Drug dealers send the spam messages to the people through email about their business, they use the email communication as the source to their advertisements in free off costs we have seen so many spam messages appear in Google mail accounts. Recently a famous website named www.pcworld.idg.com stated on 17/05/2010 that drug dealing spammers hits the Gmail accounts Encryption is a technique that it changes the data into a gibberish value by using the mathematical algorithms this helps the drug dealers to communicate the data to the addressed person, and no other can read the data, gibberish value means the data will be written in technical word or in the meaningless sentences, if the recipient has the confidential key needed to decrypt the message the date will be changed back to the original message. The increasing phenomenon taking place in the internet is that if the criminals hiring the spammers and the specialists in IT, because the can promote the website where the drugs can be sold illegally. But these types of spammed websites can be quickly discovered, but the drug tracking dealers use the different multiple layers. 5. Content sharing websites: Content sharing websites like mega upload, rapid share, Z Share etc are used by the drug dealers for communication and also torrent sharing websites are used for the communication. Websites like p2p sharing programmes and client softwares are also used by the drug dealers for the communication. Drug dealers use this because these types of websites can share the more content and can uses to upload or download for minimum of 10mb for free off cost. Whereas the lime wire, bit torrent, u torrent helps to upload or download the torrent files in the internet which these comes under the p2p sharing programmes. But compared to the other communications used by the drug dealers this is little bit slower but is secured. 6. Private online chat rooms: Private online chat rooms offer drug dealers and other criminals such as terrorists with secure communication channels where exchange of information can only be understood by the communicating end users this is a form of synchronous conferencing which it exchanges text messages on the internet. Encryption technologies like SSL are applied by the private chat rooms because to make it impossible to access their conversations to any interceptor and even makes impossible to build evidence. 7. Blogging and micro blogging websites: Similar to the social networking websites the drug dealers uses the websites like twitter they form the members in groups, where they can make messages and information and this information can be made updated daily and it can reach all the members and in the groups in that network, this way of communication is secure and fast. Which it provides a most secure and fast mode of communication to the drug dealers, and no large chunks of data will be transferred as in a VoIP call or no packet sniffers can be used to intercept keywords in emails and in instant messages. Drug dealers places their advertisements in the famous websites like they simply put an option to click if the button is clicked it directly goes to the websites of the drug dealers and it is accessed , using these type blogs by drug dealers develop their drug business. 6. Conclusions: As per the above analysis the most secure and used communication by the drug dealers is the VoIP programme softwares because this uses the Skype software and it is used with free of cost and secure of all the communication because it provides video calling and then the drug dealers can be sure that they are talking to the right person and the information that they are transmitting is reaching the right person and the Skype software is easy to access and is easy for the installation. The most important plus point in Skype is the impenetrable security aspect which the drug dealers can understand very well and hence use the system without putting their identities and information. Another key observation from the above analysis is that the drug dealers mainly follows the encryption techniques as the mode of communication, because they largely dependent on the encryption techniques .Be it the encrypted email, encrypted instant messenger programmes etc. All these technologies use method of encryption system that makes the flowing information gibberish to anyone other than the person with the right key to decrypt the message. Hence the computer forensics experts can easily find out the cracks and codes for those type of encryption and decryption methods and nab the criminals and can mount an evidence against them. 7. Analysis of possible sources evidence in the laptop file system: Extraction of evidence from a computer file system and from other digital devices like mobile phones and PDAs usually deals with the extraction of the contents of the files and the folders which are available in the laptop file system. It also deals with the extracted content from the files and folders as the interpreted data where as the interpreted data can be used for the process of the ongoing investigation to complete the digital forensic. Even though it reveals all the data, it is difficult and hard to the digital forensic expert to find out and it poses the real challenge. This section of the report deals with the discussion on the possible places where evidence may be found on the laptop file system. It also deals in finding the relative importance of the evidence by classifying it on the basis of the evidence obtained and the sources of the evidence obtained. 8 .Sources of evidence in the laptop file system: In order to understand the possible places in the file system we have to understand the file system and the technologies used for it They should have a technical knowledge on Software packages present on the laptop The operating system of the laptop The file systems in the laptop The type data organization that is available in the laptop. The forensic analysis on the seized laptop of the drug dealer would certainly contain thousands if not millions of files. Each of these files can be broadly classified into either user created files system files There may be a number of locations to look for on the file systems and therefore it is important to make a note. Possible locations of finding digital evidence: Email files. Calendars. Address books. Documents or text files. Bookmarks and favourites Text and document files. Image or graphic files Compressed files. Hidden files. Audio files Video files. Spread sheet files. Shared files. Downloaded files Uploaded files. The possible locations under the system created files are Log files Swap files History files Temporary files Back up files System files Cookies Printer files Hidden files Configuration files Storage files Large files Data files Drive files Apart from the user created files and the system files there are number of other places to look for evidences such as Computer date Computer time Computer password Deleted files Slack space Free space Bad clusters Unallocated space System areas Lost clusters Meta data. Deleted files Reserved areas Software registration Other partitions Software information The most popular types of file systems are two types FAT type NTFS system FAT stands for file allocation table, an understanding of the file system is important for the effective forensic analysis. NTFS system allows the file encryption and folder encryption where as it is not possible in the FAT32 system. The disk organisation is also an important concept to be understand for the effective analysis File allocation tables, adding and deleting files, partitions and master boot records and the patterns behind them can give a very useful insight to the investigation. The recovery of deleted files is another aspect of digital forensic investigation. The recovery of deleted files can be obtained by using debugging. 9. Conclusions: As discussed earlier even though a large amount of data can be obtained from a digital device such as laptop and from a PDA that is seized from drug dealer. But the problem for the forensic expert is to find the authentic evidence which can be presentable in the court. The common and known challenges to authenticity of digital evidence are Authenticating content. Alterations Authorship. Authenticating content: So many several cases have considered that to authenticate at the same time what foundation is necessary for the contents and appearance of a website. Web pages which are having URL and having date stamp are not self-authenticating. So, according to the analysis courts require testimony of a person with knowledge of the websites appearance to authenticate images of that website Alterations: As per the analysis the computer electronic records are easy to alter, even the opposing parties often allege that computer records lack the authenticity. Courts have rejected arguments that electronic evidence is inherently unreliable because of its potential for manipulation. Authorship: Although handwritten records may be penned in a distinctive handwriting style, computer-stored records do not necessarily identify their author; there is a particular problem with the internet communications. For example internet technologies permit users to send effectively anonymous emails, and internet relay chat channels permit users for communication without revealing their real names.

Wednesday, November 13, 2019

American History X Essay -- Film Movies Sociology

American History X American History X is clearly a film dealing with the social topic of racism. The interesting thing about this film is the way in which the subject is presented. First of all, it is obvious that, though racism is always a difficult subject to deal with, American History X presents it without any reservations or dummying down. Second, the film's figurehead for racism, Derek Vinyard (Edward Norton), is not an unintelligent redneck racist as films often portray them, but is in fact well-spoken, charismatic and bright, although he clearly holds ideals that are terribly wrong. Finally, the film shows that it is not only the white, neo-nazi racists who are fools for being involved in this, but all those who hold hatred in their hearts. Through these methods, the film instills this idea upon the viewer, in an extremely convincingly way, that hatred and racism will destroy a person and those closest to them. It is immediately revealed to the audience at the onset of this movie that there will be no holds barred and no playing down the realism of this intense racial hatred. When the film flashes back to the reason for Derek's incarceration, we see Danny, awoken by the sound of breaking glass, rush to wake up his brother and alert him that some black guys are trying to steal or wreck his truck. At hearing this, Derek immediately jumps out of bed, grabs a gun, and shoots one of them, wounds another, and fires at the third as he drives away. Then, in one of the most brutal scenes in film history, Derek forces the remaining, wounded man to put his face on the curb and Derek kicks the back of his head, smashing in the man's skull. This scene is a perfect example of cumulative causation, for it depicts the endless circl... ...ferred to comes at the end of the film, when a black student Danny had previously encountered and angered shoots him repeatedly. Derek, making a visit to the school, runs in to find that his worst nightmare had come true. His brother was dead, due to racist actions, and his life and the lives of his family will be changed forever for it. For an explanation unknown to anyone, some people are inclined to hating others. Motives may perhaps be because they are insecure of who they are, feel threatened by someone, or an explanation which no one has. This movie explains that a major reason why people hate is because they want to blame someone else for their misfortunes. It is always nice to put the responsibility on somebody else's shoulders. Hopefully in a near future people can begin to comprehend how foolish it is to hate all the time, and then start to love.